<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Then we can call a Win from in Network Security</title>
    <link>https://community.cisco.com/t5/network-security/bypass-mac-filter/m-p/2697905#M44932</link>
    <description>&lt;P&gt;Then we can call a Win from the workers of the company if the IT department doesn't have a Firewall?, Cause that is what happen here!! the workers bypass with their tablets, Smartphones even their notebooks connected to that hotspot of the permitted MAC.&lt;/P&gt;&lt;P&gt;One question more, there is some Router that has a integrated Firewall, from&amp;nbsp;the Cisco Solutions?&lt;/P&gt;&lt;P&gt;I saw here a 4600 or 4500, I want to get in TI and this contribution will help me to gain points.&lt;/P&gt;</description>
    <pubDate>Sat, 16 May 2015 01:43:21 GMT</pubDate>
    <dc:creator>Linkeichi</dc:creator>
    <dc:date>2015-05-16T01:43:21Z</dc:date>
    <item>
      <title>Bypass Mac Filter</title>
      <link>https://community.cisco.com/t5/network-security/bypass-mac-filter/m-p/2697901#M44928</link>
      <description>&lt;P&gt;I have this network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;How can i block the Internet traffic to the smarphones devices but not the traffic of the laptop?&lt;/P&gt;&lt;P&gt;Cause they are bypassing the Mac filter, due that his packets are encapsulated with the MAC of the netbook.&lt;/P&gt;&lt;P&gt;There is a way that forces the Switch or the router to read the packets and find that the destiny MAC is another one, and is not in the approved MAC Table?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;IMG src="https://community.cisco.com/legacyfs/online/media/filtrado.png" class="migrated-markup-image" /&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sun, 10 Mar 2019 13:22:54 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bypass-mac-filter/m-p/2697901#M44928</guid>
      <dc:creator>Linkeichi</dc:creator>
      <dc:date>2019-03-10T13:22:54Z</dc:date>
    </item>
    <item>
      <title>There are several ways, but</title>
      <link>https://community.cisco.com/t5/network-security/bypass-mac-filter/m-p/2697902#M44929</link>
      <description>&lt;P&gt;There are several ways, but not on the switch-level. For example:&lt;/P&gt;&lt;OL&gt;&lt;LI&gt;MDM for the Laptops that turns off tethering for smartphones&lt;/LI&gt;&lt;LI&gt;MDM for smartphones that turns off tethering to non-authorized systems&lt;/LI&gt;&lt;LI&gt;Firewalls that recognize the OS of the requesting devide&lt;/LI&gt;&lt;/OL&gt;</description>
      <pubDate>Fri, 15 May 2015 15:31:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bypass-mac-filter/m-p/2697902#M44929</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-05-15T15:31:01Z</dc:date>
    </item>
    <item>
      <title>And any suggestion of a</title>
      <link>https://community.cisco.com/t5/network-security/bypass-mac-filter/m-p/2697903#M44930</link>
      <description>&lt;P&gt;And any suggestion of a&amp;nbsp;Router level commands?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2015 15:40:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bypass-mac-filter/m-p/2697903#M44930</guid>
      <dc:creator>Linkeichi</dc:creator>
      <dc:date>2015-05-15T15:40:08Z</dc:date>
    </item>
    <item>
      <title>no, also not for the router.</title>
      <link>https://community.cisco.com/t5/network-security/bypass-mac-filter/m-p/2697904#M44931</link>
      <description>&lt;P&gt;no, also not for the router.&lt;/P&gt;</description>
      <pubDate>Fri, 15 May 2015 16:03:47 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bypass-mac-filter/m-p/2697904#M44931</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-05-15T16:03:47Z</dc:date>
    </item>
    <item>
      <title>Then we can call a Win from</title>
      <link>https://community.cisco.com/t5/network-security/bypass-mac-filter/m-p/2697905#M44932</link>
      <description>&lt;P&gt;Then we can call a Win from the workers of the company if the IT department doesn't have a Firewall?, Cause that is what happen here!! the workers bypass with their tablets, Smartphones even their notebooks connected to that hotspot of the permitted MAC.&lt;/P&gt;&lt;P&gt;One question more, there is some Router that has a integrated Firewall, from&amp;nbsp;the Cisco Solutions?&lt;/P&gt;&lt;P&gt;I saw here a 4600 or 4500, I want to get in TI and this contribution will help me to gain points.&lt;/P&gt;</description>
      <pubDate>Sat, 16 May 2015 01:43:21 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bypass-mac-filter/m-p/2697905#M44932</guid>
      <dc:creator>Linkeichi</dc:creator>
      <dc:date>2015-05-16T01:43:21Z</dc:date>
    </item>
    <item>
      <title>You should only call it a Win</title>
      <link>https://community.cisco.com/t5/network-security/bypass-mac-filter/m-p/2697906#M44933</link>
      <description>&lt;P&gt;You should only call it a Win for the workers if there were any protection mechanisms. But MAC based filters are so weak and easily avoidable that they can't really be considered a protection mechanism.&lt;/P&gt;&lt;P&gt;For Firewalling, you need something that does next-generation firewalling. The firewall embedded in IOS is not enough.&lt;/P&gt;</description>
      <pubDate>Sat, 16 May 2015 06:10:01 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bypass-mac-filter/m-p/2697906#M44933</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-05-16T06:10:01Z</dc:date>
    </item>
    <item>
      <title>Then i'll suggest a next-gen</title>
      <link>https://community.cisco.com/t5/network-security/bypass-mac-filter/m-p/2697907#M44934</link>
      <description>&lt;P&gt;Then i'll suggest a next-gen firewall.&lt;/P&gt;&lt;P&gt;Any recommendation from Cisco one&amp;nbsp;my friend?&lt;/P&gt;</description>
      <pubDate>Sat, 16 May 2015 13:06:20 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bypass-mac-filter/m-p/2697907#M44934</guid>
      <dc:creator>Linkeichi</dc:creator>
      <dc:date>2015-05-16T13:06:20Z</dc:date>
    </item>
    <item>
      <title>There are two options from</title>
      <link>https://community.cisco.com/t5/network-security/bypass-mac-filter/m-p/2697908#M44935</link>
      <description>&lt;P&gt;There are two options from Cisco:&lt;/P&gt;&lt;UL&gt;&lt;LI&gt;&lt;A href="http://www.cisco.com/c/en/us/products/security/asa-firepower-services/index.html"&gt;Cisco ASA with FirePOWER&lt;/A&gt;&lt;/LI&gt;&lt;LI&gt;&lt;A href="https://meraki.cisco.com/products/appliances"&gt;Cisco Meraki MX&lt;/A&gt;&lt;/LI&gt;&lt;/UL&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 16 May 2015 13:39:08 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bypass-mac-filter/m-p/2697908#M44935</guid>
      <dc:creator>Karsten Iwen</dc:creator>
      <dc:date>2015-05-16T13:39:08Z</dc:date>
    </item>
    <item>
      <title>Thank you, i appreciate so</title>
      <link>https://community.cisco.com/t5/network-security/bypass-mac-filter/m-p/2697909#M44936</link>
      <description>&lt;P&gt;Thank you, i appreciate so much your tracking.&lt;/P&gt;</description>
      <pubDate>Sat, 16 May 2015 13:59:52 GMT</pubDate>
      <guid>https://community.cisco.com/t5/network-security/bypass-mac-filter/m-p/2697909#M44936</guid>
      <dc:creator>Linkeichi</dc:creator>
      <dc:date>2015-05-16T13:59:52Z</dc:date>
    </item>
  </channel>
</rss>

